- I'm Malcolm Shore, and in my career helping advise onand deliver security for governments and businesses,I've seen many examples of weakexternal and internal perimeter protection.In this course, I'll explainthe technology used for perimeter defense,the risks when deploying technology at the perimeter,and the tools available to test perimeter defenses.I'll cover the major devices thatare present on corporate perimeters.These include firewalls and honeypots.I'll start by explaining the basics of firewall technologyand then demonstrate the twomain operating system firewalls.

I'll take a look at web application firewallsand API Gateway Threat Mitigation solutions.We'll learn about the Cowrie Honeypot,and we'll learn how operational security teamsuse Security Onion for intrusion detection and alerting.When you've finished this course,you'll be well-prepared to take yourfirst steps into testing client defenses.Now, let's get started with Perimeter Defenses.

Resume Transcript Auto-Scroll

Author

Released

2/15/2017

Ethical hacking—testing to see if an organization's network is vulnerable to outside attacks—is a desired skill for many IT security professionals. In this course, cybersecurity expert Malcolm Shore prepares you to take your first steps into testing client defenses. Malcolm provides you with an overview of firewall technology, and demonstrates the two main operating system firewalls. Next, he goes into web application firewalls and API gateway threat mitigation solutions. Learn about the Cowrie honeypot, how to use Security Onion to detect intrusions, and more.

Note: Learning about ethical hacking for perimeter defenses is part of the Evading IDS, Firewalls, and Honeypots competency from the Certified Ethical Hacker (CEH) body of knowledge.